Encryption Services. What Are Encryption Services? Terminology. System and Software Requirements APPENDIX 5

Size: px
Start display at page:

Download "Encryption Services. What Are Encryption Services? Terminology. System and Software Requirements APPENDIX 5"

Transcription

1 207 APPENDIX 5 Encryption Services What Are Encryption Services? 207 Terminology 207 System and Software Requirements 207 Requirements for SAS Proprietary Encryption Services 208 Communications Access Methods Support 208 North American and International Encryption Services Packages 208 Data Encryption Algorithms 209 SAS System Options 210 SAS/CONNECT Example 211 SAS/CONNECT Local Host 211 SAS/CONNECT Remote Host 212 SAS/SHARE Example 212 SAS/SHARE Client 212 SAS/SHARE Server 212 What Are Encryption Services? Encryption services protect data that is sent between hosts across a network. Encryption services use a reversible algorithm to convert plain-text data into an unintelligible form, thus protecting data from being used by unauthorized parties. Terminology This appendix addresses encryption services for both SAS/CONNECT and SAS/ SHARE software. The terms local host and remote host are used to designate local and remote sides for SAS/CONNECT and client and server sides for SAS/SHARE. System and Software Requirements You must purchase a license for SAS/SECURE in order to use the encryption services of these products: 3 RSA BSAFE Crypto-C Toolkit 3 New in Version 8, RSA BSAFE Crypto-J Toolkit, which supports Java clients that access SAS servers. The RSA BSAFE Crypto-J Toolkit is supported on these platforms:

2 208 Requirements for SAS Proprietary Encryption Services 4 Appendix 5 3 OpenVMS Alpha 3 OpenVMS VAX 3 OS/2 3 AIX 3 Compaq Tru64 UNIX (formerly Compaq s DIGITAL UNIX) 3 HP-UX 3 Solaris 2 3 OS/390. The RSA BSAFE Crypto-J Toolkit runs on any platform that has installed the Java Development Kit, Version 1.1 or later. CryptoAPI from Microsoft is an application programming interface that provides access to the cryptographic services that are provided by: 3 Windows 95 and Windows 98 (as part of Internet Explorer 3.0+) 3 Windows NT 4.0+ (as part of the operating system). Service Pack 3 or a subsequent release must be installed. You must have either of the following packages installed on your Windows host to use CryptoAPI: 3 Microsoft Base Cryptographic Service Provider 3 Microsoft Enhanced Cryptographic Service Provider. Requirements for SAS Proprietary Encryption Services You can use the SAS Proprietary encryption services on all platforms. Encryption services provided by SAS are free of charge and require no additional software license. Communications Access Methods Support Encryption services provided by the RSA BSAFE Crypto-C Toolkit and the Microsoft CryptoAPI are available with the following communications access methods on the supported hosts: 3 TCP/IP 3 DECnet 3 NetBIOS. The RSA BSAFE Crypto-J Toolkit supports the TCP/IP access method only. For example, you can use encryption services to connect two UNIX hosts when using the TCP/IP access method. Also, you can connect two Windows hosts by using either the TCP/IP, the DECnet, or the NetBIOS access method. See Communications Access Methods for SAS/CONNECT and SAS/SHARE Software for a definitive list of supported host connections by access method. North American and International Encryption Services Packages United States export regulations on encryption software restrict access to SAS/ SECURE software and related technical data as follows:

3 Encryption Services 4 Data Encryption Algorithms The SAS/SECURE Domestic version may be used or accessed only within the United States or Canada by citizens or lawfully admitted permanent residents of those countries or as otherwise permitted by special export license. 2 The SAS/SECURE International and the SAS/SECURE for Windows versions may not be exported to terrorist supporting or embargoed destinations or parties. In addition to export regulations, SAS software licensing documents may limit countries of use. Because of these export key-length restrictions, encryption services are packaged in the following forms: North American (U. S. and Canada) available to North American customers and certain other customers by special export license, supports 1024-bit or 512-bit RSA keys in combination with the following algorithms: 3 RC2 using 128-bit or 40-bit keys 3 RC4 using 128-bit or 40-bit keys 3 DES using 56-bit keys 3 Triple DES using 168-bit keys International available to International customers, supports two types of encryption: bit RSA keys in combination with the 40-bit key algorithms RC2 and RC4 3 new in Version 8, the 1024-bit RSA keys in combination with the 56-bit DES algorithm. Data Encryption Algorithms The encryption algorithms as well as the SAS Proprietary algorithm are defined as follows: RC2 A proprietary algorithm developed by RSA Data Security, Inc., RC2 is an alternative to DES. The algorithm expands a single message by up to 8 bytes. RC2 is a block cipher that encrypts data in blocks of 64 bits. The size of the output of the algorithm is always a multiple of the block size. The RC2 key size can range from 8 to 256 bits. RC4 A proprietary algorithm developed by RSA Data Security, Inc., RC4 is a stream cipher. A stream cipher encrypts one byte at a time. The RC4 key size can range from 8 to 2048 bits. Note: The term cipher means encryption algorithm. 4 DES An acronym for Data Encryption Standard, DES was developed by IBM. The algorithm expands a single message by up to 8 bytes. DES is a block cipher that encrypts data in blocks of 64 bits by using a 56-bit key. Triple DES Triple DES executes DES three times on the data in order to exploit a key size that is three times that of DES. The algorithm expands a single message by up to 8 bytes. DES is a block cipher that encrypts data in blocks of 64 bits.

4 210 SAS System Options 4 Appendix 5 SAS Proprietary This provides basic encryption services on all platforms and requires no additional product licenses. The algorithm expands a single message by approximately one-third. It uses a 32-bit key. The key sizes that are used are based on the encryption software that is available on your host and the value that is assigned to the NETENCRKEYLEN option (see the next section). SAS System Options Note: These options do not apply to hosts that use the RSA BSAFE Crypto-J Toolkit. For Java client options, see other documentation (such as the documentation about the SAS/CONNECT Driver for Java that is provided with SAS/IntrNet software). 4 For hosts that use the RSA BSAFE Crypto-C Toolkit or the Microsoft CryptoAPI, here are the SAS options that set encryption services attributes. NETENCRYPT=YES NO or NETENCRYPT NONETENCRYPT Set this option at both the local and remote hosts. At the remote host, this option specifies that encryption is required for each connection from a local host SAS session. At the local side, this option specifies that the local host must connect only to a remote host that supports encryption. By default, encryption is used if the NETENCRYPTALGORITHM= option is set and if both the local and remote sides are capable of encryption. If encryption algorithms were specified but either the local or the remote side is incapable of encryption, then encryption is not performed. Encryption may not be supported at the local or at the remote host for these reasons: 3 You are running a release of SAS (prior to Version 7) that does not support encryption. 3 Your site has not purchased a SAS/SECURE license for a specific platform. 3 You specified incompatible encryption algorithms in the local and the remote host SAS sessions. 3 You do not have a cryptographic service provider installed. NETENCRYPTALGORITHM=( algorithm1, algorithm2,...) If you specify more than one algorithm, enclose the algorithm names in parenthesis and use commas to separate them. If there are embedded blanks in the algorithm name, enclose each algorithm with quotation marks. The alias is NETENCRALG. Set this option at the remote host and, optionally, at the local host to specify one or more encryption algorithms to use in a SAS session. However, the local and remote hosts must share an encryption algorithm in common. If you specify the option in the remote host session only, the local side attempts to select an algorithm that was specified at the remote host. If you also set the option at the

5 Encryption Services 4 SAS/CONNECT Local Host 211 local host and specify an algorithm that is not specified at the remote host, the attempt by the local host to connect to that remote host fails. Valid values for this option are RC2 RC4 DES TripleDES SAS Proprietary NETENCRYPTKEYLEN=n Set this option in either the local or the remote host SAS session. It specifies the key length to be used by the encryption algorithm. The alias is NETENCRKEY. Valid values for this option are 128 specifies 1024-bit RSA and 128-bit RC2 and RC4 key algorithms. 40 specifies 512-bit RSA and 40-bit RC2 and RC4 key algorithms. 0 no value is set. This is the default. If you require extra security, set NETENCRYPTKEYLEN=128. If you want to save CPU, set NETENCRYPTKEYLEN=40. By default, if you try to connect to a host that is capable of only a 40-bit key algorithm with a host that is capable of both 40- bit and 128-bit, the connection using the lesser of the two key lengths is used. If both hosts are capable of 128-bit, then the 128-bit is used. To explicitly set one or the other, set the NETENCRYPTKEYLEN SAS option. NETMAC NONETMAC This option controls the use of Message Authentication Codes (MACs) on network communications. A Message Authentication Code is the equivalent of a checksum that is used to ensure that the original message has not been modified. The MAC integrity checking adds an extra 16 bytes to RC4 encrypted messages and an extra 24 bytes to RC2, DES, and TripleDES encrypted messages. You set this option at either the local or the remote host. The default is NETMAC. SAS/CONNECT Example SAS/CONNECT Local Host Specify the following statements in a local host session: options netencryptalgorithm=rc4; options remote=unxnode comamid=tcp; signon; The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption in the local host session.

6 212 SAS/CONNECT Remote Host 4 Appendix 5 SAS/CONNECT Remote Host The following example illustrates the content of the executable file that a UNIX spawner program uses to start SAS and to specify encryption in a SAS/CONNECT remote host session: # # mystartup # #!/bin/ksh. ~/.profile sas dmr -noterminal -no$syntaxcheck -comamid tcp -netencryptalgorithm rc4 -nete The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption of all data that is exchanged with connecting local hosts. The NETENCRYPT option specifies that encryption is required by any local host that accesses this remote host. SAS/SHARE Example SAS/SHARE Client Specify the following statements in a client session: options netencryptalgorithm=rc4; options comamid=tcp; libname sasdata edc.prog2.sasdata server=rmthost.share1; The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption in the client session. SAS/SHARE Server Specify the following statements in a SAS/SHARE server session: options netencrypt netencryptalgorithm=rc4; options comamid=tcp; proc server id=share1; run; The NETENCRYPT option specifies that encryption is required by any client that accesses this server. The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption of all data that is exchanged with connecting clients.

7 The correct bibliographic citation for this manual is as follows: SAS Institute Inc., SAS/ SHARE User s Guide, Version 8, Cary, NC: SAS Institute Inc., pp SAS/SHARE User s Guide, Version 8 Copyright 1999 by SAS Institute Inc., Cary, NC, USA. ISBN All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of the software by the government is subject to restrictions as set forth in FAR Commercial Computer Software-Restricted Rights (June 1987). SAS Institute Inc., SAS Campus Drive, Cary, North Carolina st printing, September 1999 SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. indicates USA registration. IBM, AIX, DB2, OS/2, OS/390, RMT TM, RS/6000, System/370 TM, and System/390 are registered trademarks or trademarks of International Business Machines Corporation. ORACLE is a registered trademark or trademark of Oracle Corporation. indicates USA registration. Other brand and product names are registered trademarks or trademarks of their respective companies. The Institute is a private company devoted to the support and further development of its software and related services.

When to Move a SAS File between Hosts

When to Move a SAS File between Hosts 3 CHAPTER Moving and Accessing SAS Files between Hosts When to Move a SAS File between Hosts 3 When to Access a SAS File on a Remote Host 3 Host Types Supported According to SAS Release 4 Avoiding and

More information

UNIX Operating Environment

UNIX Operating Environment 97 CHAPTER 14 UNIX Operating Environment Specifying File Attributes for UNIX 97 Determining the SAS Release Used to Create a Member 97 Creating a Transport File on Tape 98 Copying the Transport File from

More information

OS/2: TELNET Access Method

OS/2: TELNET Access Method 259 CHAPTER 18 OS/2: TELNET Access Method SAS Support for TELNET on OS/2 259 SAS/CONNECT 259 System and Software Requirements for SAS/CONNECT 259 Local Host Tasks 260 Configuring Local and Remote Host

More information

Analyzing the Server Log

Analyzing the Server Log 87 CHAPTER 7 Analyzing the Server Log Audience 87 Introduction 87 Starting the Server Log 88 Using the Server Log Analysis Tools 88 Customizing the Programs 89 Executing the Driver Program 89 About the

More information

Communications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition

Communications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition Communications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2012. Communications

More information

Encryption in SAS 9.2

Encryption in SAS 9.2 Encryption in SAS 9.2 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Encryption in SAS 9.2. Cary, NC: SAS Institute Inc. Encryption in SAS 9.2 Copyright 2009,

More information

Encryption in SAS 9.3 Second Edition

Encryption in SAS 9.3 Second Edition Encryption in SAS 9.3 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2012. Encryption in SAS 9.3, Second Edition. Cary, NC: SAS Institute

More information

Communications Access Methods for SAS/CONNECT 9.4 and SAS/SHARE 9.4 Second Edition

Communications Access Methods for SAS/CONNECT 9.4 and SAS/SHARE 9.4 Second Edition Communications Access Methods for SAS/CONNECT 9.4 and SAS/SHARE 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Communications

More information

9.1 SAS/ACCESS. Interface to SAP BW. User s Guide

9.1 SAS/ACCESS. Interface to SAP BW. User s Guide SAS/ACCESS 9.1 Interface to SAP BW User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to SAP BW: User s Guide. Cary, NC: SAS

More information

Encryption in SAS 9.4 Fifth Edition

Encryption in SAS 9.4 Fifth Edition Encryption in SAS 9.4 Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Encryption in SAS 9.4, Fifth Edition. Cary, NC: SAS Institute

More information

DBF Chapter. Note to UNIX and OS/390 Users. Import/Export Facility CHAPTER 7

DBF Chapter. Note to UNIX and OS/390 Users. Import/Export Facility CHAPTER 7 97 CHAPTER 7 DBF Chapter Note to UNIX and OS/390 Users 97 Import/Export Facility 97 Understanding DBF Essentials 98 DBF Files 98 DBF File Naming Conventions 99 DBF File Data Types 99 ACCESS Procedure Data

More information

Overview. NT Event Log. CHAPTER 8 Enhancements for SAS Users under Windows NT

Overview. NT Event Log. CHAPTER 8 Enhancements for SAS Users under Windows NT 177 CHAPTER 8 Enhancements for SAS Users under Windows NT Overview 177 NT Event Log 177 Sending Messages to the NT Event Log Using a User-Written Function 178 Examples of Using the User-Written Function

More information

SAS 9.3 Intelligence Platform

SAS 9.3 Intelligence Platform SAS 9.3 Intelligence Platform Application Server Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS SAS 9.3 Intelligence

More information

Client/Server Setup and Implementation: Web and non-web Environments John Laing, SAS Institute (Canada) Inc., Toronto, ON

Client/Server Setup and Implementation: Web and non-web Environments John Laing, SAS Institute (Canada) Inc., Toronto, ON Paper 19-25 Client/Server Setup and Implementation: Web and non-web Environments John Laing, SAS Institute (Canada) Inc., Toronto, ON ABSTRACT Client/server setup is becoming more and more challenging.

More information

Installation Instructions for Version 8 (TS M1) of the SAS System for Microsoft Windows

Installation Instructions for Version 8 (TS M1) of the SAS System for Microsoft Windows Installation Instructions for Version 8 (TS M1) of the SAS System for Microsoft Windows Table of Contents Chapter 1, Introduction...1 Terminology and Symbols Used in this Document...1 SASROOT Directory...1

More information

SAS 9.4 PC Files Server

SAS 9.4 PC Files Server SAS 9.4 PC Files Server Installation and Configuration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS 9.4 PC Files Server: Installation

More information

Guide to Operating SAS IT Resource Management 3.5 without a Middle Tier

Guide to Operating SAS IT Resource Management 3.5 without a Middle Tier Guide to Operating SAS IT Resource Management 3.5 without a Middle Tier SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. Guide to Operating SAS

More information

Chapter 32 Histograms and Bar Charts. Chapter Table of Contents VARIABLES...470 METHOD...471 OUTPUT...472 REFERENCES...474

Chapter 32 Histograms and Bar Charts. Chapter Table of Contents VARIABLES...470 METHOD...471 OUTPUT...472 REFERENCES...474 Chapter 32 Histograms and Bar Charts Chapter Table of Contents VARIABLES...470 METHOD...471 OUTPUT...472 REFERENCES...474 467 Part 3. Introduction 468 Chapter 32 Histograms and Bar Charts Bar charts are

More information

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher

More information

SAS Data Set Encryption Options

SAS Data Set Encryption Options Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2

More information

MQSeries. Clients GC33-1632-07

MQSeries. Clients GC33-1632-07 MQSeries Clients GC33-1632-07 MQSeries Clients GC33-1632-07 Note! Before using this information and the product it supports, be sure to read the general information under Appendix C. Notices on page 169.

More information

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin Procase Consulting APEX 4.1 Introduction Oleg Mochkin 1 APEX Users 2 APEX Express Use Cases 3 APEX as Solution Unique RAD tools for Oracle Database Browser based development Declarative way to build Web

More information

User Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows

User Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows User Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows Installation Instructions Where to Begin SAS Setup Wizard Repair or Remove SAS Software Glossary Where to Begin Most people who

More information

SAS 9.4 Intelligence Platform

SAS 9.4 Intelligence Platform SAS 9.4 Intelligence Platform Application Server Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Intelligence Platform:

More information

An Introduction to SAS/SHARE, By Example

An Introduction to SAS/SHARE, By Example Paper 020-29 An Introduction to SAS/SHARE, By Example Larry Altmayer, U.S. Census Bureau, Washington, DC ABSTRACT SAS/SHARE software is a useful tool for allowing several users to simultaneously access

More information

SAS. 9.4 Guide to Software Updates. SAS Documentation

SAS. 9.4 Guide to Software Updates. SAS Documentation SAS 9.4 Guide to Software Updates SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Guide to Software Updates. Cary, NC: SAS Institute

More information

SAS/ACCESS 9.3 Interface to PC Files

SAS/ACCESS 9.3 Interface to PC Files SAS/ACCESS 9.3 Interface to PC Files Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS/ACCESS 9.3 Interface to Files: Reference.

More information

Chapter 6 INTERVALS Statement. Chapter Table of Contents

Chapter 6 INTERVALS Statement. Chapter Table of Contents Chapter 6 INTERVALS Statement Chapter Table of Contents OVERVIEW...217 GETTING STARTED...218 ComputingStatisticalIntervals...218 ComputingOne-SidedLowerPredictionLimits...220 SYNTAX...222 SummaryofOptions...222

More information

SAS. 9.1.3 Intelligence Platform. System Administration Guide

SAS. 9.1.3 Intelligence Platform. System Administration Guide SAS 9.1.3 Intelligence Platform System Administration Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS 9.1.3 Intelligence Platform: System Administration

More information

FSM Encryption Whitepaper

FSM Encryption Whitepaper FSM Encryption Whitepaper FileNet System Monitor 4.0.0 FileNet Corporation Table of Contents 1. Notices... 1 2. Copyright Notice... 2 Trademarks... 2 Notice... 2 3. Preface... 4 Related Documents... 4

More information

Accessing a Remote SAS Data Library. Transcript

Accessing a Remote SAS Data Library. Transcript Accessing a Remote SAS Data Library Transcript Accessing a Remote SAS Data Library Transcript was developed by Michelle Buchecker. Additional contributions were made by Christine Riddiough and Cheryl Doninger.

More information

SAS 9.3 Drivers for ODBC

SAS 9.3 Drivers for ODBC SAS 9.3 Drivers for ODBC User s Guide Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS 9.3 Drivers for ODBC: User s Guide,

More information

SAS 9.2 Integration Technologies. Java Client Developer s Guide

SAS 9.2 Integration Technologies. Java Client Developer s Guide SAS 9.2 Integration Technologies Java Client Developer s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS 9.2 Integration Technologies: Java Client Developer

More information

Scheduling in SAS 9.3

Scheduling in SAS 9.3 Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3

More information

SAS 9.3 Logging: Configuration and Programming Reference

SAS 9.3 Logging: Configuration and Programming Reference SAS 9.3 Logging: Configuration and Programming Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS 9.3 Logging: Configuration and

More information

SAS 9.4 Logging. Configuration and Programming Reference Second Edition. SAS Documentation

SAS 9.4 Logging. Configuration and Programming Reference Second Edition. SAS Documentation SAS 9.4 Logging Configuration and Programming Reference Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS 9.4 Logging: Configuration

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

System Requirements. SAS Regular Price Optimization 4.2. Server Tier. SAS Regular Price Optimization Long Jobs Server

System Requirements. SAS Regular Price Optimization 4.2. Server Tier. SAS Regular Price Optimization Long Jobs Server System Requirements SAS Regular Price Optimization 4.2 Server Tier For information about the file sizes required for the server tier software, please visit Install Center (http://support.sas.com/installcenter)

More information

SAS University Edition: Installation Guide for Windows

SAS University Edition: Installation Guide for Windows SAS University Edition: Installation Guide for Windows i 17 June 2014 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS University Edition: Installation Guide

More information

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10. Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.3 Table of Contents Overview... 1 Configuring One-Way Secure Socket

More information

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring

More information

Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2. Last revised September 26, 2014

Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2. Last revised September 26, 2014 Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2 Last revised September 26, 2014 i Copyright Notice All rights reserved. Printed in the United States of America. No part

More information

INSTALLATION INSTRUCTIONS. Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows

INSTALLATION INSTRUCTIONS. Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows INSTALLATION INSTRUCTIONS Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows

More information

Technical Paper. Migrating a SAS Deployment to Microsoft Windows x64

Technical Paper. Migrating a SAS Deployment to Microsoft Windows x64 Technical Paper Migrating a SAS Deployment to Microsoft Windows x64 Table of Contents Abstract... 1 Introduction... 1 Why Upgrade to 64-Bit SAS?... 1 Standard Upgrade and Migration Tasks... 2 Special

More information

Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA

Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA CC13 Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA ABSTRACT Prior to SAS version 8, permanent SAS data sets cannot be moved directly

More information

SAS/IntrNet 9.4: Application Dispatcher

SAS/IntrNet 9.4: Application Dispatcher SAS/IntrNet 9.4: Application Dispatcher SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS/IntrNet 9.4: Application Dispatcher. Cary, NC: SAS

More information

OnDemand for Academics

OnDemand for Academics SAS OnDemand for Academics User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS OnDemand for Academics: User's Guide. Cary, NC:

More information

System Requirements for SAS 9.2 Foundation for Microsoft Windows for x64 Copyright 2011, SAS Institute Inc., Cary, NC, USA.

System Requirements for SAS 9.2 Foundation for Microsoft Windows for x64 Copyright 2011, SAS Institute Inc., Cary, NC, USA. Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., System Requirements for SAS 9.2 Foundation for Microsoft Windows for x64, Cary, NC: SAS Institute

More information

Scheduling in SAS 9.4 Second Edition

Scheduling in SAS 9.4 Second Edition Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute

More information

SAS University Edition: Installation Guide for Linux

SAS University Edition: Installation Guide for Linux SAS University Edition: Installation Guide for Linux i 17 June 2014 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS University Edition: Installation Guide

More information

TN3270 Security Enhancements

TN3270 Security Enhancements TN3270 Security Enhancements SecureWay Communication Server for OS/390 Copyright IBM Corporation, 1999 1 Support in OS/390 V2.R6 Copyright IBM Corporation, 1999 2 Secure Sockets Layer - What is it? Application

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

General Guide to Installation and Migration for Client/Server BAMS/DSS. Release 6.0

General Guide to Installation and Migration for Client/Server BAMS/DSS. Release 6.0 General Guide to Installation and Migration for Client/Server BAMS/DSS Release 6.0 April 2002 5700 SW 34th Street Suite 1235 Gainesville, Florida 32608-5371 Phone (352) 381-4400 Fax (352) 381-4444 E-mail

More information

SAS. 9.3 Guide to Software Updates. SAS Documentation

SAS. 9.3 Guide to Software Updates. SAS Documentation SAS 9.3 Guide to Software Updates SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS 9.3 Guide to Software Updates. Cary, NC: SAS Institute

More information

SUGI 29 Applications Development

SUGI 29 Applications Development Backing up File Systems with Hierarchical Structure Using SAS/CONNECT Fagen Xie, Kaiser Permanent Southern California, California, USA Wansu Chen, Kaiser Permanent Southern California, California, USA

More information

Chapter 2 The Data Table. Chapter Table of Contents

Chapter 2 The Data Table. Chapter Table of Contents Chapter 2 The Data Table Chapter Table of Contents Introduction... 21 Bringing in Data... 22 OpeningLocalFiles... 22 OpeningSASFiles... 27 UsingtheQueryWindow... 28 Modifying Tables... 31 Viewing and Editing

More information

Version Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America

Version Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America Version Highlights SSL Accelerator Version 2.11 New hardware and software version North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22

More information

9.1 SAS. SQL Query Window. User s Guide

9.1 SAS. SQL Query Window. User s Guide SAS 9.1 SQL Query Window User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1 SQL Query Window User s Guide. Cary, NC: SAS Institute Inc. SAS

More information

Technical Paper. Defining an ODBC Library in SAS 9.2 Management Console Using Microsoft Windows NT Authentication

Technical Paper. Defining an ODBC Library in SAS 9.2 Management Console Using Microsoft Windows NT Authentication Technical Paper Defining an ODBC Library in SAS 9.2 Management Console Using Microsoft Windows NT Authentication Release Information Content Version: 1.0 October 2015. Trademarks and Patents SAS Institute

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

HR Data Retrieval in a LDAP- Enabled Directory Service

HR Data Retrieval in a LDAP- Enabled Directory Service HR Data Retrieval in a LDAP- Enabled Directory Service HELP.PORTMANAGER Release 50A Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in

More information

SAS 9.4 Intelligence Platform: Migration Guide, Second Edition

SAS 9.4 Intelligence Platform: Migration Guide, Second Edition SAS 9.4 Intelligence Platform: Migration Guide, Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 Intelligence Platform:

More information

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security

More information

SAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide

SAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide SAS Visual Analytics 7.1 for SAS Cloud Quick-Start Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Visual Analytics 7.1 for SAS Cloud: Quick-Start Guide.

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Abstract. Introduction. Web Technology and Thin Clients. What s New in Java Version 1.1

Abstract. Introduction. Web Technology and Thin Clients. What s New in Java Version 1.1 Overview of Java Components and Applets in SAS/IntrNet Software Barbara Walters, SAS Institute Inc., Cary, NC Don Chapman, SAS Institute Inc., Cary, NC Abstract This paper describes the Java components

More information

Firewall Access Request Form

Firewall Access Request Form SECTION 1 TO BE COMPLETED BY THE APPLICANT By completing the below information the requestor/applicant acknowledges and agrees that he/she has read, understood and will comply with the following: CHECK

More information

Installation & Configuration Guide

Installation & Configuration Guide EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20

More information

SAS/IntrNet 9.3: Application Dispatcher

SAS/IntrNet 9.3: Application Dispatcher SAS/IntrNet 9.3: Application Dispatcher SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS/IntrNet 9.3: Application Dispatcher. Cary, NC: SAS

More information

Micro Focus. Data Express. SQL Server Module User Guide

Micro Focus. Data Express. SQL Server Module User Guide Micro Focus Data Express Copyright 2007-2008 Micro Focus (IP) Ltd. All rights reserved. Micro Focus (IP) Ltd. has made every effort to ensure that this book is correct and accurate, but reserves the right

More information

SAS 9.4 Intelligence Platform

SAS 9.4 Intelligence Platform SAS 9.4 Intelligence Platform Installation and Configuration Guide Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 Intelligence

More information

Implementing a SAS 9.3 Enterprise BI Server Deployment TS-811. in Microsoft Windows Operating Environments

Implementing a SAS 9.3 Enterprise BI Server Deployment TS-811. in Microsoft Windows Operating Environments Implementing a SAS 9.3 Enterprise BI Server Deployment TS-811 in Microsoft Windows Operating Environments Table of Contents Introduction... 1 Step 1: Create a SAS Software Depot..... 1 Step 2: Prepare

More information

SAS Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis

SAS Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis SAS Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2007. SAS Add-In 2.1 for Microsoft Office: Getting

More information

BusinessObjects Data Federator XI 3.0 SP1 for Windows

BusinessObjects Data Federator XI 3.0 SP1 for Windows Revision Date: December 10, 2008 BusinessObjects Data Federator XI 3.0 SP1 for Windows Overview Contents This document lists specific platforms and configurations for the BusinessObjects Data Federator

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

DEPLOYMENT ROADMAP March 2015

DEPLOYMENT ROADMAP March 2015 DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may

More information

StreamServe Persuasion SP5 Supported platforms and software

StreamServe Persuasion SP5 Supported platforms and software StreamServe Persuasion SP5 Supported platforms and software Reference Guide Rev A StreamServe Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520

More information

SecureVault Online Backup Service FAQ

SecureVault Online Backup Service FAQ SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault

More information

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4. Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle

More information

SAS 9.4 In-Database Products

SAS 9.4 In-Database Products SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:

More information

This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd.

This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd. This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd. 1 Job Management Partner 1 Version 9 Availability Management

More information

CA DLP. Release Notes for Advanced Encryption. r12.0

CA DLP. Release Notes for Advanced Encryption. r12.0 CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes

More information

How To Use A Sas Server On A Java Computer Or A Java.Net Computer (Sas) On A Microsoft Microsoft Server (Sasa) On An Ipo (Sauge) Or A Microsas (Sask

How To Use A Sas Server On A Java Computer Or A Java.Net Computer (Sas) On A Microsoft Microsoft Server (Sasa) On An Ipo (Sauge) Or A Microsas (Sask Exploiting SAS Software Using Java Technology Barbara Walters, SAS Institute Inc., Cary, NC Abstract This paper describes how to use Java technology with SAS software. SAS Institute currently offers several

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

ERserver. iseries. Securing applications with SSL

ERserver. iseries. Securing applications with SSL ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users

More information

System Requirements for SAS 9.4 Foundation for Linux for x64

System Requirements for SAS 9.4 Foundation for Linux for x64 System Requirements for SAS 9.4 Foundation for Linux for x64 Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. System Requirements for SAS 9.4

More information

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication

More information

Grid Computing in SAS 9.4 Third Edition

Grid Computing in SAS 9.4 Third Edition Grid Computing in SAS 9.4 Third Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. Grid Computing in SAS 9.4, Third Edition. Cary, NC:

More information

Delivering Dynamic Content with the SAS Stored Process Web Application

Delivering Dynamic Content with the SAS Stored Process Web Application Delivering Dynamic Content with the SAS Stored Process Web Application Frederick Pratter, Eastern Oregon University, La Grande, OR ABSTRACT Many Web developers have been moving away from the CGI technology

More information

The Encryption Technology of Automatic Teller Machine Networks

The Encryption Technology of Automatic Teller Machine Networks Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller

More information

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002 Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Security Audit Log (BC-SEC)

Security Audit Log (BC-SEC) HELP.BCSECAUDLOG Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express

More information

Veritas NetBackup Installation Guide

Veritas NetBackup Installation Guide Veritas NetBackup Installation Guide Windows Release 6.5 12308334 NetBackup Installation Guide Copyright 1998-2007 Symantec Corporation. All rights reserved. NetBackup 6.5 Symantec, the Symantec logo,

More information

PeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide

PeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide PeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide June 2012 PeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide SKU crm91hwsw

More information

Siebel Security Guide. Version 8.0, Rev. C February 2011

Siebel Security Guide. Version 8.0, Rev. C February 2011 Siebel Security Guide Version 8.0, Rev. C February 2011 Copyright 2005, 2011 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain

More information

System Requirements. SAS Profitability Management 2.2. Deployment

System Requirements. SAS Profitability Management 2.2. Deployment System Requirements SAS Profitability Management 2.2 This document provides the requirements f installing and running SAS Profitability Management 2.2 software. You must update your computer to meet these

More information

Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List

Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on December 20, 2013 Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

SAS 9.4 Management Console

SAS 9.4 Management Console SAS 9.4 Management Console Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide to

More information